• Title/Summary/Keyword: 초기인증

Search Result 204, Processing Time 0.022 seconds

u-Home 표준화 및 서비스 활성화 정책 방향

  • Hyeon, Jong-Ung
    • TTA Journal
    • /
    • s.110
    • /
    • pp.40-45
    • /
    • 2007
  • 융합적 특성을 갖는 u-Home 서비스는 다양한 기기 및 네트워크의 상호 연동을 필수적으로 수반한다. 초기 단계인 홈네트워크 산업의 육성을 위해서는 핵심기술의 개발뿐만 아니라 기술표준의 제정, 상용화 적용 및 인증제도의 확립, 융합형 신제품.서비스의 시장형성을 위한 법규와 제도의 정비 등 다방면에 걸친 산업기반 구축이 필요하다. 본 고에서는 u-Home 기술동향을 간략히 살펴보고 표준화 및 서비스 활성화를 위한 정책방향을 제시하고자 한다.

  • PDF

A Session Key Exchange Scheme for Authentication and SDP Encryption to Protect P2P SPIT in SIP (SIP P2P 스팸 방지를 위한 인증 및 SDP 암호화 키 교환 기법)

  • Jang, Yu-Jung;Choi, Jae-Sic;Choi, Jae-Duck;Won, Yoo-Jae;Cho, Young-Duk;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.750-757
    • /
    • 2007
  • This paper analyzes spam threats and proposes key exchange scheme for user authentication and SDP encryption to protect potential spam threats in SIP-based VoIP services. The existing HTTP digest authentication scheme exchanges many message because challenge is sent for every establishment of the session and doesn't provide a confidentiality of SDP. To protect SPIT, our scheme exchanges initial nonce and a session master key for authentication and SDP encryption during registration. In our scheme, the challenge and response procedure is not necessary and the communication overhead is much less than applying S/MIME or TLS.

Cryptanalysis and Remedy Scheme on Qiu et al.'s Enhanced Password Authentication Scheme for SIP (SIP를 위한 Qiu등의 개선된 패스워드 인증 기법에 대한 보안 분석 및 강화 기법)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.249-256
    • /
    • 2020
  • The session initiation protocol (SIP) is a signaling protocol, which is used to controlling communication session creation, manage and finish over Internet protocol. Based on it, we can implement various services like voice based electronic commerce or instant messaging. Recently, Qiu et al. proposed an enhanced password authentication scheme for SIP. However, this paper withdraws that Qiu et al.'s scheme is weak against the off-line password guessing attack and has denial of service problem. Addition to this, we propose an improved password authentication scheme as a remedy scheme of Qiu et al.'s scheme. For this, the proposed scheme does not use server's verifier and is based on elliptic curve cryptography. Security validation is provided based on a formal validation tool ProVerif. Security analysis shows that the improved authentication scheme is strong against various attacks over SIP.

NBAS: NFT-based Bluetooth Device Authentication System (NBAS: NFT를 활용한 블루투스 장치 인증시스템)

  • Hwang, Seong-Uk;Son, Sung-Moo;Chung, Sung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.793-801
    • /
    • 2022
  • Most Bluetooth devices are commonly used in various ways these days, but they can be often lost due to small-size devices. However, most Bluetooth protocol do not provide authentication functions to legitimate owners, and thus someone who obtains the lost Bluetooth device can easily connect to their smart devices to use it. In this paper, we propose NBAS can authenticates legitimate owners using NFT on lossy Bluetooth devices.NBAS generates a digital wallet on the blockchain using the decentralized network Ethereum blockchain and facilitating the MAC address of the Bluetooth device in the digital wallet. The owner of the wallet uses a private key to certify the Bluetooth device using NFT. The initial pairing time of NBAS was 10.25 sec, but the reconnection time was 0.007 sec similar to the conventional method, and the pairing rejection time for unapproved users was 1.58 sec on average. Therefore, the proposed NBAS effectively shows the device authentication over the conventional Bluetooth.

Hybrid Authentication Scheme for Mobile Multi-hop Relay in IEEE 802.16j (IEEE 802.16j기반의 모바일 멀티 홉 릴레이에서의 혼합형 인증 기법에 대한 연구)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.127-136
    • /
    • 2007
  • It is easy to install and maintain a mobile multi-hop wireless network due to its self-organizing characteristics. However it has security weakness of the authentication of mobile multi-hop relay stations. Specially, the mobile multi-hop relay network in the IEEE 802.16j has the additional security weakness caused by the requirement of backward compatibility for mobile stations of the conventional IEEE 802.16 system. In this paper, we propose a novel mutual authentication scheme applicable to IEEE 802.16j-based mobile multi-hop relay network architecture. The scheme is able to resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which have been considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively. Also, we analyze the effectiveness of the proposed hybrid authentication method.

A study of synthesis method Lean DFSS and Advanced Product Quality Planning of ISO/TS16949 (Lean DFSS와 ISO/TS16949 APQP의 통합에 관한 연구)

  • Kwon, Sok;Lee, Kang-Koon
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2006.11a
    • /
    • pp.381-388
    • /
    • 2006
  • 많은 6시그마 혁신을 하는 기업 중에서 IS09000 시리즈나 IS0/TS16949 인증을 받고 있다. 그럼에도 불구하고 6시그마 도입 초기부터 ISO/TS16949와 통합운영을 생각하고 추진하는 곳은 많지 않다. ISO/TS16949에서는 기업전반의 프로세스에 많은 중점을 두고 있다. 그 중에서도 APQP(Advanced Product Quality Planning)은 제품 초기에서 부터 명확한 품질계획 업무 프로세스를 가지고 활동을 하라는 필수 프로세스를 요구하고 있다. 그러나 구체적인 Flow나 단계는 각 기업체의 특성에 맞기고 있다. 6시그마의 Lean DFSS는 이러한 제품개발 프로세스의 구체적인 전개단계를 제공 하고 있다. 여기에 APQP에 서 요건으로 명시한 각 프로세스 단계마다 인풋(Input)요소, 아웃풋(Output) 요소, 타켓(Target), 그 프로세스를 책임질 구성원, 핵심성공요인(KSF), 핵심성공지수(KPI), 단계마다의 FMEA(Failure Mode Effect Analysis) 분석을 대응하면 도입 초기에서 부터 상호 유기적이면서 효과적인 System이 된다.

  • PDF

Aircraft configuration selection method using the airworthiness certification and the decision making process (항공안전 규정 및 의사결정모델을 이용한 항공기 형상선정기법 연구)

  • Yoon, Jung-Won;Bae, Bo-Young;Lee, Jae-Woo;Byun, Yung-Hwan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.5
    • /
    • pp.467-476
    • /
    • 2010
  • For the very light jet aircraft design, the design baseline configuration has been selected using the logical decision making process, and the design optimization problem is formulated by considering the airworthiness regulations as design constraints. Airworthiness regulations are the minimum requirements for the safe aircraft flight and must be considered from the conceptual design stage. After carefully selecting the airworthiness constraints and the user specified requirements, a series of design making models including the affinity diagram, nested column diagram, quality function deployment (QFD), Pugh concept selection matrix, are used to find and evaluate alternative configuration baselines. From the feasible design space searching process, the best altenative design, which satisfies the airworthiness constraints while excluding the user subjective decisions as much as possible, has been successfully derived.

Design of an RFID Authentication Protocol Using Nonlinear Tent-Map (비선형 Tent-Map을 이용한 RFID 인증 프로토콜 설계)

  • Han, Kyu-Kwang;Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.10
    • /
    • pp.1145-1152
    • /
    • 2014
  • The RFID (Radio-Frequency Identification) system is a technology to discern things by radio and an epoch-making new method to improve product management such as distribution, transport, mobilization, inventory control. However, RFID, which uses radio, is at risk for information leakage and falsification due to the vulnerability of security of the communication section. We designed the new authentication protocol by applying the tent map, which is the representative complex systems, to the RFID communication system. A more solid and simple authentication system was designed by applying the initial value sensitivity and irregularity, which are the representative characteristics of the complex system, to the reader and tag of RFID. The purpose of this paper is to verify the usability of the RFID authentication protocol design that uses the nonlinear system shown in this thesis by the new system differentiated from the authentication system that depends on the existing hash function or random numbers.

Improved u-Healthcare Service Authentication Protocol based on RFID Technology (개선된 RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.107-115
    • /
    • 2013
  • Recently, the RFID technology is combined with a u-healthcare services is an emerging trend in the field of medical services. u-healthcare service, as covering the field of personal health information beyond the level of simple health screening and treatment of life are closely related. Considering security, invasion of privacy, as well as life may be threatened even if your personal health information to be exposed or exploited illegally u-Healthcare services certification is essential. In 2012, Jeong proposed J-L patient authentication protocol that Initialization process, and patients using RFID technology separates the certification process. Jeong, such as the claim that the proposed protocol for reuse attacks, spoofing attacks, prevent information disclosure and traceability fire safety, but raises issues of security and operations efficiency. Therefore, in this paper, Jeong, such as the security of the proposed protocol and to prove the computational efficiency issues, and to enhance the safety and efficiency of RFID technology based on practical u-Healthcare services authentication protocol is proposed.

Architecture Modeling for Kiosk-based Public Services through Web (키오스크 기반 웹 민원처리시스템 구축을 위한 아키텍쳐 모델링)

  • 안임상;정기원
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.285-301
    • /
    • 2004
  • Public service provision through internet is one of major parts for e-government implementation. It is essential to link the internal administrative network with internet to provide the services through internet and to support kiosks through internet, which should result in critical issues for security. A relay server, as a front server for the public service processing system and a web server, a control server for kiosks, are placed between the public service processing system and kiosks to solve those security issues. It is the way to solve security issues through protecting direct communication between the public service processing system and a web server and authenticating a relay server and a web server through authentication process. In the implementation of the system this paper provide a design for an architecture model of the public service processing system through internet, which are aiming to develop high level of the quality system effectively, to reduce the risk of initial stage of development, and to reduce the incurring cost due to reworks.

  • PDF